Riffle (anonymity network)

From Wikipedia, the free encyclopedia

Riffle is an anonymity network developed by researchers at MIT and EPFL as a response to the problems of the Tor network.

Riffle employs a verifiable shuffle and a symmetric-key algorithm.[1][2] Like Tor, it utilizes onion routing.[3] According to MIT's Larry Hardesty, researchers at MIT and the Qatar Computing Research Institute demonstrated a vulnerability in Tor's design.[4]

Messages sent over Riffle are not forwarded if they have been altered by a compromised server. The server has to attach proof in order to forward the message.[5]

The main intended use-case is anonymous file sharing. According to the lead project researcher, Riffle is intended to be complementary to Tor, not a replacement.[6]

See also[]

References[]

  1. ^ Kwon, Albert; Lazar, David; Devadas, Srinivas; Ford, Bryan (1 April 2016). "Riffle: An Efficient Communication System With Strong Anonymity" (PDF). Proceedings on Privacy Enhancing Technologies. 2: 115–134. doi:10.1515/popets-2016-0008.
  2. ^ Uchill, Joe (2016-07-11). "Researchers tout new anonymity network". TheHill. Retrieved 2021-02-12.
  3. ^ Francisco, Iain Thomson in San. "Meet Riffle, the next-gen anonymity network that hopes to trounce Tor". www.theregister.com. Retrieved 2021-02-12.
  4. ^ Larry Hardesty (11 July 2016). "How to stay anonymous online". MIT News.
  5. ^ Sickert, Teresa (2016-07-21). "Riffle: Neue Tor-Alternative soll noch mehr Sicherheit bieten". Der Spiegel (in German). Archived from the original on 2016-07-24. Retrieved 2021-02-12.
  6. ^ "Building a new Tor that can resist next-generation state surveillance". Ars Technica. 2016-08-31. Retrieved 2021-02-12.{{cite web}}: CS1 maint: url-status (link)

External links[]


Retrieved from ""